What is phishing and their types
Q. What is phishing?
Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details, often for malicious reason, by disguising as a trustworthly entity is an electronic communication.
Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter personal information at a fake website the look and feel of which are identical to the legitmate one and the only difference is the URL of the website in concern.
Different kinds of phishing attacks
1. Spear phishing
* The goal is the same as deceptive phishing: sure the victim into slicking on a malilcious URL or email attachment, so that they will hand over their personal data.
* Spear phishing is especially commenplace on social media like Linkedin, where attackers can use multiple sources of information to craft a targeted attack email.
* To protect against this type of scam, organizations should conduct ongoing employee security awarness training that among other things, discourages users from publishiong sensitive personal or corporate information on social media. companies should also invest in solutions that are capable of analyzing inbound emails for know malicious links/email attachments.
2. Clone phishing
Clone phishing is a type of phishing attack where by a legitmate and previously delivered, email containing an attahment or link has had its content and receipt address(es) taken and used to create an almost identical or cloned email. the attachment or link within the email is replaced with a malicious version and then sent from an email address spoofed to apper to come from the original or an updated version to the original.
3. Whaling phishing
Several phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kind of attacks.
4. Deceptive phishing
The term "Phishing" originally referred to accounts using instant messaging but the most common broadcast method today is a deceptive email message. messages about the need to verify account information,,system failure requiring users to re-enter their information, fictitions account charges, undesirable account charges, new free services requiring quick action, and many other scams are broadcast to a wide group of receipts with the hope that the unwary will respond by clicking a link to or singing onto a bogus site where their confidential information can be collected.
5. Phone phishing
Not all phishing attacks require a fake websites messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone numbers(owned by the phisher and provided by a voice over IP service) was dialed, prompts told users to enter their account numbers and PIN. vishing(voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization. SMS phishing uses cell phone text messages to induce people to vivulge their personal information.
Hope, you learned something new
Comments
Post a Comment